Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation.
Junzuo LaiZhengan HuangMan Ho AuXianping MaoPublished in: ACISP (2018)
Keyphrases
- proxy re encryption
- encryption scheme
- multi hop
- cca secure
- standard model
- ciphertext
- security model
- wireless networks
- public key
- keyword search
- mobile ad hoc networks
- data transmission
- wireless sensor networks
- security analysis
- identity based encryption
- energy efficient
- ad hoc networks
- energy consumption
- base station
- end to end
- diffie hellman
- routing protocol
- routing algorithm
- public key cryptosystem
- secret key
- provably secure
- lossless compression
- data sharing
- database
- real time
- database systems
- relational databases
- wavelet transform
- access control
- quality of service